Hello Bob and all,

Thanks for all the nice comments!

>Just to throw something into this that I don't think anyone has mentioned
>yet.  What if you skipped the rpm database all together and run the verify
>against the original RPM from RedHat?  For example, "rpm -Vp somefile.rpm"?
Well, it makes sense to keep my original purpose in mind. I need the
functionality to be able to foil casual attackers against the honeypot
(where I replace /bin/rm with my varian of /bin/mv). I highly doubt
verification vs RedHat.com will be done by those people.

BTW, I am fully aware of LKM rootkits and researching using one of those
for the honeypot. However, I still try to stick with Honeynet project
philosophy of minimum modification to a system. There is a bunch of ways
to trojan Linux system up to and including writing a new OS that looks
just like Linux from the command prompt ;-)~

Best regards,
-- 
     Anton A. Chuvakin, Ph.D.
     http://www.chuvakin.org
   http://www.info-secure.org

Reply via email to